
Summary
The detection rule titled 'SUID/SGID Bit Set' identifies potentially malicious attempts to manipulate the setuid or setgid bits on files within Unix-like systems, particularly targeting Linux and macOS. These bits allow executable files to run with the privileges of the file's owner or group, which can be exploited by adversaries for privilege escalation. The rule employs an EQL query to monitor for specific commands (chmod, install) active in setting these bits while filtering out legitimate processes related to package management, Docker, and other identified safe paths. The analysis includes a comprehensive guide for investigating incidents involving this rule, highlighting steps for examining processes, reviewing system logs, and correlating activities that could point to unauthorized privilege elevation attempts. False positive management strategies are also outlined, ensuring legitimate system operations are not wrongly flagged. This allows security teams to respond proactively by isolating affected systems, terminating suspicious processes, and auditing for any unauthorized account accesses.
Categories
- Endpoint
- Linux
- macOS
Data Sources
- Process
- File
- Application Log
ATT&CK Techniques
- T1548
- T1548.001
Created: 2020-04-23